7.8
CVSSv2

CVE-2012-3817

Published: 25/07/2012 Updated: 30/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 696
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x prior to 9.7.6-P2; 9.8.x prior to 9.8.3-P2; 9.9.x prior to 9.9.1-P2; and 9.6-ESV prior to 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote malicious users to cause a denial of service (assertion failure and daemon exit) by sending many queries.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.4.3

isc bind 9.4

isc bind 9.4.2

isc bind 9.4.0

isc bind 9.4.1

isc bind 9.5.0

isc bind 9.5.1

isc bind 9.5.2

isc bind 9.5.3

isc bind 9.5

isc bind 9.6.0

isc bind 9.6.1

isc bind 9.6.3

isc bind 9.6.2

isc bind 9.7.1

isc bind 9.7.2

isc bind 9.7.3

isc bind 9.7.5

isc bind 9.7.0

isc bind 9.7.4

isc bind 9.7.6

isc bind 9.8.0

isc bind 9.8.1

isc bind 9.8.3

isc bind 9.8.2

isc bind 9.9.0

isc bind 9.9.1

isc bind 9.6

Vendor Advisories

Debian Bug report logs - #683259 CVE-2012-3817 Package: bind9; Maintainer for bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Source for bind9 is src:bind9 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Mon, 30 Jul 2012 08:54:01 UTC Severity: grave Tags: security Fix ...
Bind could be made to crash if it received specially crafted network traffic ...
Synopsis Important: bind security update Type/Severity Security Advisory: Important Topic Updated bind packages that fix one security issue are now available forRed Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerabilit ...
Synopsis Important: bind97 security update Type/Severity Security Advisory: Important Topic Updated bind97 packages that fix one security issue are now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerability ...
Einar Lonn discovered that under certain conditions bind9, a DNS server, may use cached data before initialization As a result, an attacker can trigger an assertion failure on servers under high query load that do DNSSEC validation For the stable distribution (squeeze), this problem has been fixed in version 1:973dfsg-1~squeeze6 For the testi ...
An uninitialized data structure use flaw was found in BIND when DNSSEC validation was enabled A remote attacker able to send a large number of queries to a DNSSEC validating BIND resolver could use this flaw to cause it to exit unexpectedly with an assertion failure (CVE-2012-3817) ...